1 Security Threats

DOI: 10.1201/9781003245223-1

Human error is not an explanation, rather it is something to be explained. In analyzing and learning from incidents, not just security incidents, you should never be satisfied with anyone closing out a post-mortem or issue as having a root cause of human error.

Phil Venables, Google Cloud CISO

1.1 Introduction

If you use a computer that is connected to the Internet, your information is at risk. Our sensitive data can also be stolen through third-party vendors. Even more startling is that the time between an attack and disclosure from a third party is about 75 days! Imagine what can be done with stolen information in that amount of time. In addition, the most common type of third-party attack ...

Get What Every Engineer Should Know About Cyber Security and Digital Forensics, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.